Skip to main content

Table 2 Devices configuration in test-bed network environment

From: Low-rate DoS attack detection based on two-step cluster analysis and UTR analysis

DeviceOperate systemSoftwareFunction
Legitimate User 1Windows 7Python socketLegitimate user sending network traffic
Legitimate User 2Windows 7Python socketLegitimate user sending network traffic
Legitimate User 3Windows 7Python socketLegitimate user sending network traffic
AttackerWindows 7Python socketLDoS attacker
ServerWindows 7Python socketServer receiving network traffic
Router1Routing ProtocolForwarding packets
Router2Routing ProtocolForwarding packets